7.6

CVSS3.1

CVE-2025-27461 - CVE-2025-27461

During startup, the device automatically logs in the EPC2 Windows user without requesting a password.

๐Ÿ“… Published: July 3, 2025, 11:34 a.m. ๐Ÿ”„ Last Modified: Feb. 6, 2026, 2:39 p.m.

7.6

CVSS3.1

CVE-2025-27460 - CVE-2025-27460

The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can โ€ฆ

๐Ÿ“… Published: July 3, 2025, 11:34 a.m. ๐Ÿ”„ Last Modified: Feb. 6, 2026, 2:39 p.m.

4.4

CVSS3.1

CVE-2025-27459 - CVE-2025-27459

The VNC application stores its passwords encrypted within the registry but uses DES for encryption. As DES is broken, the original passwords can be recovered.

๐Ÿ“… Published: July 3, 2025, 11:33 a.m. ๐Ÿ”„ Last Modified: Jan. 29, 2026, 7:28 p.m.

6.5

CVSS3.1

CVE-2025-27458 - CVE-2025-27458

The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses maโ€ฆ

๐Ÿ“… Published: July 3, 2025, 11:33 a.m. ๐Ÿ”„ Last Modified: Feb. 6, 2026, 2:39 p.m.

6.5

CVSS3.1

CVE-2025-27457 - CVE-2025-27457

All communication between the VNC server and client(s) is unencrypted. This allows an attacker to intercept the traffic and obtain sensitive data.

๐Ÿ“… Published: July 3, 2025, 11:32 a.m. ๐Ÿ”„ Last Modified: Feb. 6, 2026, 2:39 p.m.

7.5

CVSS3.1

CVE-2025-27456 - CVE-2025-27456

The SMB server's login mechanism does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

๐Ÿ“… Published: July 3, 2025, 11:32 a.m. ๐Ÿ”„ Last Modified: Feb. 6, 2026, 2:39 p.m.

4.3

CVSS3.1

CVE-2025-27455 - CVE-2025-27455

The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of tโ€ฆ

๐Ÿ“… Published: July 3, 2025, 11:30 a.m. ๐Ÿ”„ Last Modified: Feb. 6, 2026, 2:39 p.m.

4.3

CVSS3.1

CVE-2025-27454 - CVE-2025-27454

The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request.

๐Ÿ“… Published: July 3, 2025, 11:30 a.m. ๐Ÿ”„ Last Modified: Feb. 6, 2026, 2:39 p.m.

5.3

CVSS3.1

CVE-2025-27453 - CVE-2025-27453

The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript.

๐Ÿ“… Published: July 3, 2025, 11:29 a.m. ๐Ÿ”„ Last Modified: Jan. 29, 2026, 6:02 p.m.

5.3

CVSS3.1

CVE-2025-27452 - CVE-2025-27452

The configuration of the Apache httpd webserver which serves the MEAC300-FNADE4 web application, is partly insecure. There are modules activated that are not required for the operation of the FNADE4 web application. The functionality of the some modules pose a risk to the webserver which enable dโ€ฆ

๐Ÿ“… Published: July 3, 2025, 11:29 a.m. ๐Ÿ”„ Last Modified: Feb. 6, 2026, 2:38 p.m.
Total resulsts: 344963
Page 4381 of 34,497
ยซ previous page ยป next page
Filters